Exam 18: Secure Software Development
Exam 1: Introduction and Security Trends49 Questions
Exam 2: General Security Concepts65 Questions
Exam 3: Operational-Organizational Security43 Questions
Exam 4: The Role of People in Security40 Questions
Exam 5: Cryptography49 Questions
Exam 6: Public Key Infrastructure50 Questions
Exam 7: Standards and Protocols44 Questions
Exam 8: Physical Security45 Questions
Exam 9: Network Fundamentals55 Questions
Exam 10: Infrastructure Security42 Questions
Exam 11: Authentication and Remote Access46 Questions
Exam 12: Wireless43 Questions
Exam 13: Intrusion Detection Systems and Network Security49 Questions
Exam 14: Baselines45 Questions
Exam 15: Types of Attacks and Malicious Software50 Questions
Exam 16: E-Mail and Instant Messaging47 Questions
Exam 17: Web Components45 Questions
Exam 18: Secure Software Development40 Questions
Exam 19: Disaster Recovery, Business Continuity, and Organizational Policies53 Questions
Exam 20: Risk Management42 Questions
Exam 21: Change Management35 Questions
Exam 22: Privilege Management39 Questions
Exam 23: Computer Forensics40 Questions
Exam 24: Legal Issues and Ethics40 Questions
Exam 25: Privacy40 Questions
Select questions type
The _______________ model is characterized by a multistep process in which the steps follow each other in a linear,one-way fashion,like water over a waterfall
Free
(Short Answer)
4.8/5
(43)
Correct Answer:
waterfall
In the secure development lifecycle,how must the specific security needs of software being developed be defined?
Free
(Multiple Choice)
4.8/5
(41)
Correct Answer:
C
Which type of error occurs when a program executes the error checking routine,prior to manipulating strings to a base form?
Free
(Multiple Choice)
4.8/5
(35)
Correct Answer:
A
The specific security needs of a program being developed should be defined in the design phase of the secure development lifecycle.
(True/False)
4.7/5
(33)
Proper use of _______________ can provide a wealth of programmatic functionality,such as authentication,confidentiality,integrity,and nonrepudiation.
(Short Answer)
4.8/5
(35)
What is used to compare program responses to known inputs and comparison of the output to desired output?
(Multiple Choice)
4.8/5
(39)
In the secure development lifecycle,employing use cases to compare program responses to known inputs,and then comparing the outputs to the desired outputs should take place in which phase?
(Multiple Choice)
4.8/5
(35)
Determining what needs to be accessed,and the appropriate level of permission for every item accessed is an example of what principle?
(Multiple Choice)
4.9/5
(34)
_______________ is the systematic application of a series of malformed inputs to test how the program responds.
(Short Answer)
4.8/5
(21)
How can secure coding be incorporated into the software development process?
(Essay)
4.9/5
(32)
In the secure development lifecycle,in which phase should minimizing the attack surface area take place?
(Multiple Choice)
4.9/5
(26)
The spiral model is characterized by iterative development,where requirements and solutions evolve through an ongoing collaboration between self-organizing,cross-functional teams.
(True/False)
4.8/5
(34)
You are interviewing for a job as a software developer.The interviewer asks you to explain good software development practices.
(Essay)
4.8/5
(37)
When the function of code is changed in an unintended way,it is an example of code injection.
(True/False)
4.8/5
(32)
_______________,historically,has not been an integral part of the software development life cycle.
(Short Answer)
4.8/5
(30)
Showing 1 - 20 of 40
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)